Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 05:16

General

  • Target

    c1d1f48f7d75faf372edc3d5142a459234e87963b6b7f9ceb60258f34ef27643N.exe

  • Size

    94KB

  • MD5

    b50603db66413f03c2c2d396c1e05dc0

  • SHA1

    9aa8417c78819573d421c08546e9386a814649f1

  • SHA256

    c1d1f48f7d75faf372edc3d5142a459234e87963b6b7f9ceb60258f34ef27643

  • SHA512

    895c6903c4240af9edd75d06c68b9dec82d3e264745f12162f091a9938fc8410a91f25b908b018be71b6bb4f516f63729a381d2f6fa63fe38e077e244f8eea24

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBHfiP3zHQYL5HRXxkcKck:fny1tESQM5HRXxkBck

Malware Config

Signatures

  • Renames multiple (2886) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1d1f48f7d75faf372edc3d5142a459234e87963b6b7f9ceb60258f34ef27643N.exe
    "C:\Users\Admin\AppData\Local\Temp\c1d1f48f7d75faf372edc3d5142a459234e87963b6b7f9ceb60258f34ef27643N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    95KB

    MD5

    fb779929c8bda2ab3ba0af1a15b03f7d

    SHA1

    93c0de57a4c8aab5fb44c6489f690935293109e4

    SHA256

    7114fbba2a5a1f16a79de509695c0afcf4a040cb15b04b08a7fdc6a0921c2da7

    SHA512

    a19bc88250cd3470cccd67f95cbf30c7ba1507b5d3d64edc9c072c2f029fe51e22c46041ebac9eb6a45ae89bf40033aced6ef24b3df693de36b13f7ff347a6cc

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    104KB

    MD5

    3de7893f6bd1b302460c9896d8e27cb7

    SHA1

    76cedca33f915e097708a32b3e65e57143af4dc8

    SHA256

    5ed4ae1b2248b26c2cbdbb679ec10c1e8465d3be40e417f6180be2f6ceffd8c6

    SHA512

    3398e992eeb1e0fd2d10d2807eb9f774650a90d66463d6d8711095ff827e049bd4e34bead6b8a5c4aba74e611bf440966c0fc0bd41769e196202d6f5514977cc

  • memory/2016-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2016-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB